Behavioral task
behavioral1
Sample
2808-4-0x0000000000400000-0x000000000063B000-memory.exe
Resource
win7-20240220-en
General
-
Target
2808-4-0x0000000000400000-0x000000000063B000-memory.dmp
-
Size
2.2MB
-
MD5
e1b0bbd28f0ada33aea38318f37cdaa4
-
SHA1
aaddc11df8ac1a4d221da31dbb0f1cf618b9db76
-
SHA256
4c6bcf2210cacb1eac0efd22ce7c40d48006dcc3ab85bb4d3cce7bd9d50300c0
-
SHA512
529b1a0b4e9e8390378f39abc5bb7367ff6934fa0195be502f27af7c550bf8cc211ade8b8e52238b5c6729f3fed6282bab48b897d8c427b82e10978b5f000722
-
SSDEEP
3072:fvyLlG8KPgpJSG61doHN4NoQiUukOoy3+XVrRGJ/U:fvyhJryZoIohvkOpOVdA/
Malware Config
Extracted
stealc
http://185.172.128.151
-
url_path
/7043a0c6a68d9c65.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2808-4-0x0000000000400000-0x000000000063B000-memory.dmp
Files
-
2808-4-0x0000000000400000-0x000000000063B000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ